374330e2 |
1 | #include <windows.h> |
2 | #include <stdio.h> |
3 | #include <stdlib.h> |
4d331a77 |
4 | #ifndef AUTO_WINSOCK |
5 | #ifdef WINSOCK_TWO |
6 | #include <winsock2.h> |
7 | #else |
374330e2 |
8 | #include <winsock.h> |
4d331a77 |
9 | #endif |
10 | #endif |
374330e2 |
11 | |
12 | #include "putty.h" |
13 | |
14 | #ifndef FALSE |
15 | #define FALSE 0 |
16 | #endif |
17 | #ifndef TRUE |
18 | #define TRUE 1 |
19 | #endif |
20 | |
21 | static SOCKET s = INVALID_SOCKET; |
22 | |
23 | #define IAC 255 /* interpret as command: */ |
24 | #define DONT 254 /* you are not to use option */ |
25 | #define DO 253 /* please, you use option */ |
26 | #define WONT 252 /* I won't use option */ |
27 | #define WILL 251 /* I will use option */ |
28 | #define SB 250 /* interpret as subnegotiation */ |
29 | #define SE 240 /* end sub negotiation */ |
30 | |
31 | #define GA 249 /* you may reverse the line */ |
32 | #define EL 248 /* erase the current line */ |
33 | #define EC 247 /* erase the current character */ |
34 | #define AYT 246 /* are you there */ |
35 | #define AO 245 /* abort output--but let prog finish */ |
36 | #define IP 244 /* interrupt process--permanently */ |
37 | #define BREAK 243 /* break */ |
38 | #define DM 242 /* data mark--for connect. cleaning */ |
39 | #define NOP 241 /* nop */ |
40 | #define EOR 239 /* end of record (transparent mode) */ |
41 | #define ABORT 238 /* Abort process */ |
42 | #define SUSP 237 /* Suspend process */ |
43 | #define xEOF 236 /* End of file: EOF is already used... */ |
44 | |
45 | #define TELOPT_BINARY 0 /* 8-bit data path */ |
46 | #define TELOPT_ECHO 1 /* echo */ |
47 | #define TELOPT_RCP 2 /* prepare to reconnect */ |
48 | #define TELOPT_SGA 3 /* suppress go ahead */ |
49 | #define TELOPT_NAMS 4 /* approximate message size */ |
50 | #define TELOPT_STATUS 5 /* give status */ |
51 | #define TELOPT_TM 6 /* timing mark */ |
52 | #define TELOPT_RCTE 7 /* remote controlled transmission and echo */ |
53 | #define TELOPT_NAOL 8 /* negotiate about output line width */ |
54 | #define TELOPT_NAOP 9 /* negotiate about output page size */ |
55 | #define TELOPT_NAOCRD 10 /* negotiate about CR disposition */ |
56 | #define TELOPT_NAOHTS 11 /* negotiate about horizontal tabstops */ |
57 | #define TELOPT_NAOHTD 12 /* negotiate about horizontal tab disposition */ |
58 | #define TELOPT_NAOFFD 13 /* negotiate about formfeed disposition */ |
59 | #define TELOPT_NAOVTS 14 /* negotiate about vertical tab stops */ |
60 | #define TELOPT_NAOVTD 15 /* negotiate about vertical tab disposition */ |
61 | #define TELOPT_NAOLFD 16 /* negotiate about output LF disposition */ |
62 | #define TELOPT_XASCII 17 /* extended ascic character set */ |
63 | #define TELOPT_LOGOUT 18 /* force logout */ |
64 | #define TELOPT_BM 19 /* byte macro */ |
65 | #define TELOPT_DET 20 /* data entry terminal */ |
66 | #define TELOPT_SUPDUP 21 /* supdup protocol */ |
67 | #define TELOPT_SUPDUPOUTPUT 22 /* supdup output */ |
68 | #define TELOPT_SNDLOC 23 /* send location */ |
69 | #define TELOPT_TTYPE 24 /* terminal type */ |
70 | #define TELOPT_EOR 25 /* end or record */ |
71 | #define TELOPT_TUID 26 /* TACACS user identification */ |
72 | #define TELOPT_OUTMRK 27 /* output marking */ |
73 | #define TELOPT_TTYLOC 28 /* terminal location number */ |
74 | #define TELOPT_3270REGIME 29 /* 3270 regime */ |
75 | #define TELOPT_X3PAD 30 /* X.3 PAD */ |
76 | #define TELOPT_NAWS 31 /* window size */ |
77 | #define TELOPT_TSPEED 32 /* terminal speed */ |
78 | #define TELOPT_LFLOW 33 /* remote flow control */ |
79 | #define TELOPT_LINEMODE 34 /* Linemode option */ |
80 | #define TELOPT_XDISPLOC 35 /* X Display Location */ |
81 | #define TELOPT_OLD_ENVIRON 36 /* Old - Environment variables */ |
82 | #define TELOPT_AUTHENTICATION 37/* Authenticate */ |
83 | #define TELOPT_ENCRYPT 38 /* Encryption option */ |
84 | #define TELOPT_NEW_ENVIRON 39 /* New - Environment variables */ |
85 | #define TELOPT_EXOPL 255 /* extended-options-list */ |
86 | |
87 | #define TELQUAL_IS 0 /* option is... */ |
88 | #define TELQUAL_SEND 1 /* send option */ |
89 | #define TELQUAL_INFO 2 /* ENVIRON: informational version of IS */ |
90 | #define BSD_VAR 1 |
91 | #define BSD_VALUE 0 |
92 | #define RFC_VAR 0 |
93 | #define RFC_VALUE 1 |
94 | |
95 | #define CR 13 |
96 | #define LF 10 |
97 | #define NUL 0 |
98 | |
99 | #define iswritable(x) ( (x) != IAC && (x) != CR ) |
100 | |
101 | static char *telopt(int opt) { |
102 | #define i(x) if (opt == TELOPT_ ## x) return #x; |
103 | i(BINARY); i(ECHO); i(RCP); i(SGA); i(NAMS); i(STATUS); i(TM); i(RCTE); |
104 | i(NAOL); i(NAOP); i(NAOCRD); i(NAOHTS); i(NAOHTD); i(NAOFFD); i(NAOVTS); |
105 | i(NAOVTD); i(NAOLFD); i(XASCII); i(LOGOUT); i(BM); i(DET); i(SUPDUP); |
106 | i(SUPDUPOUTPUT); i(SNDLOC); i(TTYPE); i(EOR); i(TUID); i(OUTMRK); |
107 | i(TTYLOC); i(X3PAD); i(NAWS); i(TSPEED); i(LFLOW); i(LINEMODE); |
108 | i(XDISPLOC); i(OLD_ENVIRON); i(AUTHENTICATION); i(ENCRYPT); |
109 | i(NEW_ENVIRON); i(EXOPL); |
110 | #undef i |
111 | return "<unknown>"; |
112 | } |
113 | |
114 | static void telnet_size(void); |
115 | |
116 | struct Opt { |
117 | int send; /* what we initially send */ |
118 | int nsend; /* -ve send if requested to stop it */ |
119 | int ack, nak; /* +ve and -ve acknowledgements */ |
120 | int option; /* the option code */ |
121 | enum { |
122 | REQUESTED, ACTIVE, INACTIVE, REALLY_INACTIVE |
123 | } state; |
124 | }; |
125 | |
126 | static struct Opt o_naws = {WILL, WONT, DO, DONT, TELOPT_NAWS, REQUESTED}; |
127 | static struct Opt o_tspeed = {WILL, WONT, DO, DONT, TELOPT_TSPEED, REQUESTED}; |
128 | static struct Opt o_ttype = {WILL, WONT, DO, DONT, TELOPT_TTYPE, REQUESTED}; |
129 | static struct Opt o_oenv = {WILL, WONT, DO, DONT, TELOPT_OLD_ENVIRON, |
130 | INACTIVE}; |
131 | static struct Opt o_nenv = {WILL, WONT, DO, DONT, TELOPT_NEW_ENVIRON, |
132 | REQUESTED}; |
133 | static struct Opt o_echo = {DO, DONT, WILL, WONT, TELOPT_ECHO, REQUESTED}; |
134 | static struct Opt o_we_sga = {WILL, WONT, DO, DONT, TELOPT_SGA, REQUESTED}; |
135 | static struct Opt o_they_sga = {DO, DONT, WILL, WONT, TELOPT_SGA, REQUESTED}; |
136 | |
137 | static struct Opt *opts[] = { |
138 | &o_naws, &o_tspeed, &o_ttype, &o_oenv, &o_nenv, &o_echo, |
139 | &o_we_sga, &o_they_sga, NULL |
140 | }; |
141 | |
374330e2 |
142 | static int in_synch; |
374330e2 |
143 | static int sb_opt, sb_len; |
144 | static char *sb_buf = NULL; |
145 | static int sb_size = 0; |
146 | #define SB_DELTA 1024 |
147 | |
148 | static void try_write (void) { |
149 | while (outbuf_head != outbuf_reap) { |
150 | int end = (outbuf_reap < outbuf_head ? outbuf_head : OUTBUF_SIZE); |
151 | int len = end - outbuf_reap; |
152 | int ret; |
153 | |
154 | ret = send (s, outbuf+outbuf_reap, len, 0); |
155 | if (ret > 0) |
156 | outbuf_reap = (outbuf_reap + ret) & OUTBUF_MASK; |
157 | if (ret < len) |
158 | return; |
159 | } |
160 | } |
161 | |
162 | static void s_write (void *buf, int len) { |
163 | unsigned char *p = buf; |
164 | while (len--) { |
165 | int new_head = (outbuf_head + 1) & OUTBUF_MASK; |
166 | if (new_head != outbuf_reap) { |
167 | outbuf[outbuf_head] = *p++; |
168 | outbuf_head = new_head; |
169 | } |
170 | } |
171 | try_write(); |
172 | } |
173 | |
374330e2 |
174 | static void log_option (char *sender, int cmd, int option) { |
175 | char buf[50]; |
176 | sprintf(buf, "%s:\t%s %s", sender, |
177 | (cmd == WILL ? "WILL" : cmd == WONT ? "WONT" : |
178 | cmd == DO ? "DO" : cmd == DONT ? "DONT" : "<??>"), |
179 | telopt(option)); |
c5e9c988 |
180 | logevent(buf); |
374330e2 |
181 | } |
182 | |
183 | static void send_opt (int cmd, int option) { |
184 | unsigned char b[3]; |
185 | |
186 | b[0] = IAC; b[1] = cmd; b[2] = option; |
187 | s_write (b, 3); |
188 | log_option("client", cmd, option); |
189 | } |
190 | |
191 | static void deactivate_option (struct Opt *o) { |
192 | if (o->state == REQUESTED || o->state == ACTIVE) |
193 | send_opt (o->nsend, o->option); |
194 | o->state = REALLY_INACTIVE; |
195 | } |
196 | |
197 | static void activate_option (struct Opt *o) { |
198 | if (o->send == WILL && o->option == TELOPT_NAWS) |
199 | telnet_size(); |
200 | if (o->send == WILL && |
201 | (o->option == TELOPT_NEW_ENVIRON || |
202 | o->option == TELOPT_OLD_ENVIRON)) { |
203 | /* |
204 | * We may only have one kind of ENVIRON going at a time. |
205 | * This is a hack, but who cares. |
206 | */ |
207 | deactivate_option (o->option==TELOPT_NEW_ENVIRON ? &o_oenv : &o_nenv); |
208 | } |
2f938b83 |
209 | if (o->option == TELOPT_ECHO && cfg.ldisc_term) |
684d367c |
210 | ldisc = &ldisc_simple; |
374330e2 |
211 | } |
212 | |
213 | static void refused_option (struct Opt *o) { |
214 | if (o->send == WILL && o->option == TELOPT_NEW_ENVIRON && |
215 | o_oenv.state == INACTIVE) { |
216 | send_opt (WILL, TELOPT_OLD_ENVIRON); |
217 | o_oenv.state = REQUESTED; |
218 | } |
2f938b83 |
219 | if (o->option == TELOPT_ECHO && cfg.ldisc_term) |
684d367c |
220 | ldisc = &ldisc_term; |
374330e2 |
221 | } |
222 | |
223 | static void proc_rec_opt (int cmd, int option) { |
224 | struct Opt **o; |
225 | |
226 | log_option ("server", cmd, option); |
227 | for (o = opts; *o; o++) { |
228 | if ((*o)->option == option && (*o)->ack == cmd) { |
229 | switch ((*o)->state) { |
230 | case REQUESTED: |
231 | (*o)->state = ACTIVE; |
232 | activate_option (*o); |
233 | break; |
234 | case ACTIVE: |
235 | break; |
236 | case INACTIVE: |
237 | (*o)->state = ACTIVE; |
238 | send_opt ((*o)->send, option); |
239 | activate_option (*o); |
240 | break; |
241 | case REALLY_INACTIVE: |
242 | send_opt ((*o)->nsend, option); |
243 | break; |
244 | } |
245 | return; |
246 | } else if ((*o)->option == option && (*o)->nak == cmd) { |
247 | switch ((*o)->state) { |
248 | case REQUESTED: |
249 | (*o)->state = INACTIVE; |
250 | refused_option (*o); |
251 | break; |
252 | case ACTIVE: |
253 | (*o)->state = INACTIVE; |
254 | send_opt ((*o)->nsend, option); |
255 | break; |
256 | case INACTIVE: |
257 | case REALLY_INACTIVE: |
258 | break; |
259 | } |
260 | return; |
261 | } |
262 | } |
263 | /* |
264 | * If we reach here, the option was one we weren't prepared to |
265 | * cope with. So send a negative ack. |
266 | */ |
267 | send_opt ((cmd == WILL ? DONT : WONT), option); |
268 | } |
269 | |
270 | static void process_subneg (void) { |
271 | unsigned char b[2048], *p, *q; |
272 | int var, value, n; |
273 | char *e; |
274 | |
275 | switch (sb_opt) { |
276 | case TELOPT_TSPEED: |
277 | if (sb_len == 1 && sb_buf[0] == TELQUAL_SEND) { |
278 | char logbuf[sizeof(cfg.termspeed)+80]; |
279 | b[0] = IAC; b[1] = SB; b[2] = TELOPT_TSPEED; |
280 | b[3] = TELQUAL_IS; |
281 | strcpy(b+4, cfg.termspeed); |
282 | n = 4 + strlen(cfg.termspeed); |
283 | b[n] = IAC; b[n+1] = SE; |
284 | s_write (b, n+2); |
c5e9c988 |
285 | logevent("server:\tSB TSPEED SEND"); |
374330e2 |
286 | sprintf(logbuf, "client:\tSB TSPEED IS %s", cfg.termspeed); |
c5e9c988 |
287 | logevent (logbuf); |
374330e2 |
288 | } else |
c5e9c988 |
289 | logevent ("server:\tSB TSPEED <something weird>"); |
374330e2 |
290 | break; |
291 | case TELOPT_TTYPE: |
292 | if (sb_len == 1 && sb_buf[0] == TELQUAL_SEND) { |
293 | char logbuf[sizeof(cfg.termtype)+80]; |
294 | b[0] = IAC; b[1] = SB; b[2] = TELOPT_TTYPE; |
295 | b[3] = TELQUAL_IS; |
296 | for (n = 0; cfg.termtype[n]; n++) |
297 | b[n+4] = (cfg.termtype[n] >= 'a' && cfg.termtype[n] <= 'z' ? |
298 | cfg.termtype[n] + 'A'-'a' : cfg.termtype[n]); |
299 | b[n+4] = IAC; b[n+5] = SE; |
300 | s_write (b, n+6); |
301 | b[n+4] = 0; |
c5e9c988 |
302 | logevent("server:\tSB TTYPE SEND"); |
374330e2 |
303 | sprintf(logbuf, "client:\tSB TTYPE IS %s", b+4); |
c5e9c988 |
304 | logevent(logbuf); |
374330e2 |
305 | } else |
c5e9c988 |
306 | logevent("server:\tSB TTYPE <something weird>\r\n"); |
374330e2 |
307 | break; |
308 | case TELOPT_OLD_ENVIRON: |
309 | case TELOPT_NEW_ENVIRON: |
310 | p = sb_buf; |
311 | q = p + sb_len; |
312 | if (p < q && *p == TELQUAL_SEND) { |
313 | char logbuf[50]; |
314 | p++; |
315 | sprintf (logbuf, "server:\tSB %s SEND", telopt(sb_opt)); |
c5e9c988 |
316 | logevent (logbuf); |
374330e2 |
317 | if (sb_opt == TELOPT_OLD_ENVIRON) { |
318 | if (cfg.rfc_environ) { |
319 | value = RFC_VALUE; |
320 | var = RFC_VAR; |
321 | } else { |
322 | value = BSD_VALUE; |
323 | var = BSD_VAR; |
324 | } |
325 | /* |
326 | * Try to guess the sense of VAR and VALUE. |
327 | */ |
328 | while (p < q) { |
329 | if (*p == RFC_VAR) { |
330 | value = RFC_VALUE; |
331 | var = RFC_VAR; |
332 | } else if (*p == BSD_VAR) { |
333 | value = BSD_VALUE; |
334 | var = BSD_VAR; |
335 | } |
336 | p++; |
337 | } |
338 | } else { |
339 | /* |
340 | * With NEW_ENVIRON, the sense of VAR and VALUE |
341 | * isn't in doubt. |
342 | */ |
343 | value = RFC_VALUE; |
344 | var = RFC_VAR; |
345 | } |
346 | b[0] = IAC; b[1] = SB; b[2] = sb_opt; |
347 | b[3] = TELQUAL_IS; |
348 | n = 4; |
37508af4 |
349 | e = cfg.environmt; |
374330e2 |
350 | while (*e) { |
351 | b[n++] = var; |
352 | while (*e && *e != '\t') b[n++] = *e++; |
353 | if (*e == '\t') e++; |
354 | b[n++] = value; |
355 | while (*e) b[n++] = *e++; |
356 | e++; |
357 | } |
358 | if (*cfg.username) { |
359 | b[n++] = var; b[n++] = 'U'; b[n++] = 'S'; |
360 | b[n++] = 'E'; b[n++] = 'R'; b[n++] = value; |
361 | e = cfg.username; |
362 | while (*e) b[n++] = *e++; |
363 | } |
364 | b[n++] = IAC; b[n++] = SE; |
365 | s_write (b, n); |
366 | sprintf(logbuf, "client:\tSB %s IS %s", telopt(sb_opt), |
367 | n==6 ? "<nothing>" : "<stuff>"); |
c5e9c988 |
368 | logevent (logbuf); |
374330e2 |
369 | } |
370 | break; |
371 | } |
372 | } |
373 | |
374 | static enum { |
375 | TOPLEVEL, SEENIAC, SEENWILL, SEENWONT, SEENDO, SEENDONT, |
376 | SEENSB, SUBNEGOT, SUBNEG_IAC, SEENCR |
377 | } telnet_state = TOPLEVEL; |
378 | |
379 | static void do_telnet_read (char *buf, int len) { |
374330e2 |
380 | |
381 | while (len--) { |
382 | int c = (unsigned char) *buf++; |
383 | |
384 | switch (telnet_state) { |
385 | case TOPLEVEL: |
386 | case SEENCR: |
387 | if (c == NUL && telnet_state == SEENCR) |
388 | telnet_state = TOPLEVEL; |
389 | else if (c == IAC) |
390 | telnet_state = SEENIAC; |
391 | else { |
374330e2 |
392 | if (!in_synch) |
c9def1b8 |
393 | c_write1(c); |
2f938b83 |
394 | |
395 | #if 1 |
396 | /* I can't get the F***ing winsock to insert the urgent IAC |
397 | * into the right position! Even with SO_OOBINLINE it gives |
398 | * it to recv too soon. And of course the DM byte (that |
399 | * arrives in the same packet!) appears several K later!! |
400 | * |
401 | * Oh well, we do get the DM in the right place so I'll |
402 | * just stop hiding on the next 0xf2 and hope for the best. |
403 | */ |
404 | else if (c == DM) in_synch = 0; |
405 | #endif |
374330e2 |
406 | if (c == CR) |
407 | telnet_state = SEENCR; |
408 | else |
409 | telnet_state = TOPLEVEL; |
410 | } |
411 | break; |
412 | case SEENIAC: |
413 | if (c == DO) telnet_state = SEENDO; |
414 | else if (c == DONT) telnet_state = SEENDONT; |
415 | else if (c == WILL) telnet_state = SEENWILL; |
416 | else if (c == WONT) telnet_state = SEENWONT; |
417 | else if (c == SB) telnet_state = SEENSB; |
2f938b83 |
418 | else if (c == DM) { |
419 | in_synch = 0; |
420 | telnet_state = TOPLEVEL; |
421 | } |
300d41b0 |
422 | else { |
ded38628 |
423 | /* ignore everything else; print it if it's IAC */ |
424 | if (c == IAC) { |
c9def1b8 |
425 | c_write1(c); |
ded38628 |
426 | } |
300d41b0 |
427 | telnet_state = TOPLEVEL; |
428 | } |
374330e2 |
429 | break; |
430 | case SEENWILL: |
431 | proc_rec_opt (WILL, c); |
432 | telnet_state = TOPLEVEL; |
433 | break; |
434 | case SEENWONT: |
435 | proc_rec_opt (WONT, c); |
436 | telnet_state = TOPLEVEL; |
437 | break; |
438 | case SEENDO: |
439 | proc_rec_opt (DO, c); |
440 | telnet_state = TOPLEVEL; |
441 | break; |
442 | case SEENDONT: |
443 | proc_rec_opt (DONT, c); |
444 | telnet_state = TOPLEVEL; |
445 | break; |
446 | case SEENSB: |
447 | sb_opt = c; |
448 | sb_len = 0; |
449 | telnet_state = SUBNEGOT; |
450 | break; |
451 | case SUBNEGOT: |
452 | if (c == IAC) |
453 | telnet_state = SUBNEG_IAC; |
454 | else { |
455 | subneg_addchar: |
456 | if (sb_len >= sb_size) { |
457 | char *newbuf; |
458 | sb_size += SB_DELTA; |
459 | newbuf = (sb_buf ? |
c9def1b8 |
460 | srealloc(sb_buf, sb_size) : |
461 | smalloc(sb_size)); |
374330e2 |
462 | if (newbuf) |
463 | sb_buf = newbuf; |
464 | else |
465 | sb_size -= SB_DELTA; |
466 | } |
467 | if (sb_len < sb_size) |
468 | sb_buf[sb_len++] = c; |
469 | telnet_state = SUBNEGOT;/* in case we came here by goto */ |
470 | } |
471 | break; |
472 | case SUBNEG_IAC: |
473 | if (c != SE) |
474 | goto subneg_addchar; /* yes, it's a hack, I know, but... */ |
475 | else { |
476 | process_subneg(); |
477 | telnet_state = TOPLEVEL; |
478 | } |
479 | break; |
480 | } |
481 | } |
482 | } |
483 | |
484 | /* |
485 | * Called to set up the Telnet connection. Will arrange for |
486 | * WM_NETEVENT messages to be passed to the specified window, whose |
487 | * window procedure should then call telnet_msg(). |
488 | * |
489 | * Returns an error message, or NULL on success. |
490 | * |
491 | * Also places the canonical host name into `realhost'. |
492 | */ |
493 | static char *telnet_init (HWND hwnd, char *host, int port, char **realhost) { |
494 | SOCKADDR_IN addr; |
495 | struct hostent *h; |
496 | unsigned long a; |
497 | |
498 | /* |
499 | * Try to find host. |
500 | */ |
501 | if ( (a = inet_addr(host)) == (unsigned long) INADDR_NONE) { |
502 | if ( (h = gethostbyname(host)) == NULL) |
503 | switch (WSAGetLastError()) { |
504 | case WSAENETDOWN: return "Network is down"; |
505 | case WSAHOST_NOT_FOUND: case WSANO_DATA: |
506 | return "Host does not exist"; |
507 | case WSATRY_AGAIN: return "Host not found"; |
508 | default: return "gethostbyname: unknown error"; |
509 | } |
510 | memcpy (&a, h->h_addr, sizeof(a)); |
511 | *realhost = h->h_name; |
512 | } else |
513 | *realhost = host; |
514 | a = ntohl(a); |
515 | |
516 | if (port < 0) |
517 | port = 23; /* default telnet port */ |
518 | |
519 | /* |
520 | * Open socket. |
521 | */ |
522 | s = socket(AF_INET, SOCK_STREAM, 0); |
523 | if (s == INVALID_SOCKET) |
524 | switch (WSAGetLastError()) { |
525 | case WSAENETDOWN: return "Network is down"; |
526 | case WSAEAFNOSUPPORT: return "TCP/IP support not present"; |
527 | default: return "socket(): unknown error"; |
528 | } |
529 | |
374330e2 |
530 | { |
531 | BOOL b = TRUE; |
532 | setsockopt (s, SOL_SOCKET, SO_OOBINLINE, (void *)&b, sizeof(b)); |
533 | } |
374330e2 |
534 | |
535 | /* |
536 | * Bind to local address. |
537 | */ |
538 | addr.sin_family = AF_INET; |
539 | addr.sin_addr.s_addr = htonl(INADDR_ANY); |
540 | addr.sin_port = htons(0); |
541 | if (bind (s, (struct sockaddr *)&addr, sizeof(addr)) == SOCKET_ERROR) |
542 | switch (WSAGetLastError()) { |
543 | case WSAENETDOWN: return "Network is down"; |
544 | default: return "bind(): unknown error"; |
545 | } |
546 | |
547 | /* |
548 | * Connect to remote address. |
549 | */ |
550 | addr.sin_addr.s_addr = htonl(a); |
551 | addr.sin_port = htons((short)port); |
552 | if (connect (s, (struct sockaddr *)&addr, sizeof(addr)) == SOCKET_ERROR) |
553 | switch (WSAGetLastError()) { |
554 | case WSAENETDOWN: return "Network is down"; |
555 | case WSAECONNREFUSED: return "Connection refused"; |
556 | case WSAENETUNREACH: return "Network is unreachable"; |
557 | case WSAEHOSTUNREACH: return "No route to host"; |
558 | default: return "connect(): unknown error"; |
559 | } |
560 | |
4017be6d |
561 | if (hwnd && WSAAsyncSelect (s, hwnd, WM_NETEVENT, FD_READ | |
374330e2 |
562 | FD_WRITE | FD_OOB | FD_CLOSE) == SOCKET_ERROR) |
563 | switch (WSAGetLastError()) { |
564 | case WSAENETDOWN: return "Network is down"; |
565 | default: return "WSAAsyncSelect(): unknown error"; |
566 | } |
567 | |
568 | /* |
569 | * Initialise option states. |
570 | */ |
eb5e1db9 |
571 | if( cfg.ldisc_term ) |
572 | { |
573 | struct Opt **o; |
574 | |
575 | for (o = opts; *o; o++) |
576 | if ((*o)->state == REQUESTED) |
577 | (*o)->state = INACTIVE; |
578 | } |
579 | else |
374330e2 |
580 | { |
581 | struct Opt **o; |
582 | |
583 | for (o = opts; *o; o++) |
584 | if ((*o)->state == REQUESTED) |
585 | send_opt ((*o)->send, (*o)->option); |
586 | } |
587 | |
374330e2 |
588 | /* |
589 | * Set up SYNCH state. |
590 | */ |
591 | in_synch = FALSE; |
6f34e365 |
592 | |
593 | /* |
594 | * We have no pre-session phase. |
595 | */ |
596 | begin_session(); |
597 | |
374330e2 |
598 | return NULL; |
599 | } |
600 | |
601 | /* |
602 | * Process a WM_NETEVENT message. Will return 0 if the connection |
603 | * has closed, or <0 for a socket error. |
604 | */ |
605 | static int telnet_msg (WPARAM wParam, LPARAM lParam) { |
606 | int ret; |
c9def1b8 |
607 | /* This needs to be larger than the packet size now that inbuf |
608 | * cannot overflow, in fact the fewer calls we make to windows |
609 | * the faster we will run! |
610 | */ |
611 | char buf[16384]; |
374330e2 |
612 | |
8ce72d2c |
613 | /* |
614 | * Because reading less than the whole of the available pending |
615 | * data can generate an FD_READ event, we need to allow for the |
616 | * possibility that FD_READ may arrive with FD_CLOSE already in |
617 | * the queue; so it's possible that we can get here even with s |
618 | * invalid. If so, we return 1 and don't worry about it. |
619 | */ |
620 | if (s == INVALID_SOCKET) |
621 | return 1; |
374330e2 |
622 | |
8d5de777 |
623 | if (WSAGETSELECTERROR(lParam) != 0) { |
624 | closesocket(s); |
625 | s = INVALID_SOCKET; |
374330e2 |
626 | return -WSAGETSELECTERROR(lParam); |
8d5de777 |
627 | } |
374330e2 |
628 | |
629 | switch (WSAGETSELECTEVENT(lParam)) { |
630 | case FD_READ: |
8ce72d2c |
631 | case FD_CLOSE: |
2f938b83 |
632 | { |
633 | int clear_of_oob = 1; |
ec55b220 |
634 | |
635 | /* Don't check for error return; some shims don't support |
636 | * this ioctl. |
637 | */ |
638 | ioctlsocket (s, SIOCATMARK, &clear_of_oob); |
2f938b83 |
639 | |
640 | in_synch = !clear_of_oob; |
641 | |
642 | do { |
643 | ret = recv(s, buf, sizeof(buf), 0); |
644 | if (ret < 0 && WSAGetLastError() == WSAEWOULDBLOCK) |
645 | return 1; |
8d5de777 |
646 | if (ret < 0) { /* any _other_ error */ |
647 | closesocket(s); |
648 | s = INVALID_SOCKET; |
2f938b83 |
649 | return -10000-WSAGetLastError(); |
8d5de777 |
650 | } |
2f938b83 |
651 | if (ret == 0) { |
652 | s = INVALID_SOCKET; |
653 | return 0; |
654 | } |
2f938b83 |
655 | do_telnet_read (buf, ret); |
656 | } while (in_synch); |
374330e2 |
657 | } |
374330e2 |
658 | return 1; |
659 | case FD_WRITE: |
660 | if (outbuf_head != outbuf_reap) |
661 | try_write(); |
662 | return 1; |
374330e2 |
663 | } |
664 | return 1; /* shouldn't happen, but WTF */ |
665 | } |
666 | |
667 | /* |
668 | * Called to send data down the Telnet connection. |
669 | */ |
670 | static void telnet_send (char *buf, int len) { |
671 | char *p; |
672 | static unsigned char iac[2] = { IAC, IAC }; |
673 | static unsigned char cr[2] = { CR, NUL }; |
eb5e1db9 |
674 | static unsigned char nl[2] = { CR, LF }; |
374330e2 |
675 | |
676 | if (s == INVALID_SOCKET) |
677 | return; |
678 | |
679 | p = buf; |
2f938b83 |
680 | while (p < buf+len) { |
374330e2 |
681 | char *q = p; |
682 | |
683 | while (iswritable((unsigned char)*p) && p < buf+len) p++; |
684 | s_write (q, p-q); |
685 | |
686 | while (p < buf+len && !iswritable((unsigned char)*p)) { |
eb5e1db9 |
687 | s_write ((unsigned char)*p == IAC ? iac : nl, 2); |
374330e2 |
688 | p++; |
689 | } |
690 | } |
691 | } |
692 | |
693 | /* |
694 | * Called to set the size of the window from Telnet's POV. |
695 | */ |
696 | static void telnet_size(void) { |
697 | unsigned char b[16]; |
698 | char logbuf[50]; |
699 | |
700 | if (s == INVALID_SOCKET || o_naws.state != ACTIVE) |
701 | return; |
702 | b[0] = IAC; b[1] = SB; b[2] = TELOPT_NAWS; |
703 | b[3] = cols >> 8; b[4] = cols & 0xFF; |
704 | b[5] = rows >> 8; b[6] = rows & 0xFF; |
705 | b[7] = IAC; b[8] = SE; |
706 | s_write (b, 9); |
707 | sprintf(logbuf, "client:\tSB NAWS %d,%d", |
708 | ((unsigned char)b[3] << 8) + (unsigned char)b[4], |
709 | ((unsigned char)b[5] << 8) + (unsigned char)b[6]); |
c5e9c988 |
710 | logevent (logbuf); |
374330e2 |
711 | } |
712 | |
713 | /* |
714 | * Send Telnet special codes. |
715 | */ |
716 | static void telnet_special (Telnet_Special code) { |
717 | unsigned char b[2]; |
718 | |
719 | if (s == INVALID_SOCKET) |
720 | return; |
721 | |
722 | b[0] = IAC; |
723 | switch (code) { |
724 | case TS_AYT: b[1] = AYT; s_write (b, 2); break; |
725 | case TS_BRK: b[1] = BREAK; s_write (b, 2); break; |
726 | case TS_EC: b[1] = EC; s_write (b, 2); break; |
727 | case TS_EL: b[1] = EL; s_write (b, 2); break; |
728 | case TS_GA: b[1] = GA; s_write (b, 2); break; |
729 | case TS_NOP: b[1] = NOP; s_write (b, 2); break; |
730 | case TS_ABORT: b[1] = ABORT; s_write (b, 2); break; |
731 | case TS_AO: b[1] = AO; s_write (b, 2); break; |
732 | case TS_IP: b[1] = IP; s_write (b, 2); break; |
733 | case TS_SUSP: b[1] = SUSP; s_write (b, 2); break; |
734 | case TS_EOR: b[1] = EOR; s_write (b, 2); break; |
735 | case TS_EOF: b[1] = xEOF; s_write (b, 2); break; |
736 | case TS_SYNCH: |
737 | outbuf_head = outbuf_reap = 0; |
684d367c |
738 | b[1] = DM; |
739 | send (s, b, 2, MSG_OOB); |
740 | break; |
741 | case TS_RECHO: |
742 | if (o_echo.state == INACTIVE || o_echo.state == REALLY_INACTIVE) { |
743 | o_echo.state = REQUESTED; |
744 | send_opt (o_echo.send, o_echo.option); |
745 | } |
746 | break; |
747 | case TS_LECHO: |
748 | if (o_echo.state == ACTIVE) { |
749 | o_echo.state = REQUESTED; |
750 | send_opt (o_echo.nsend, o_echo.option); |
751 | } |
374330e2 |
752 | break; |
ec55b220 |
753 | case TS_PING: |
754 | if (o_they_sga.state == ACTIVE) { |
755 | b[1] = NOP; |
756 | s_write (b, 2); |
757 | } |
758 | break; |
374330e2 |
759 | } |
760 | } |
761 | |
8ccc75b0 |
762 | static SOCKET telnet_socket(void) { return s; } |
763 | |
764 | static int telnet_sendok(void) { return 1; } |
4017be6d |
765 | |
374330e2 |
766 | Backend telnet_backend = { |
767 | telnet_init, |
768 | telnet_msg, |
769 | telnet_send, |
770 | telnet_size, |
4017be6d |
771 | telnet_special, |
8ccc75b0 |
772 | telnet_socket, |
97db3be4 |
773 | telnet_sendok, |
774 | 23 |
374330e2 |
775 | }; |